Cyber security news for all


    Microsoft Fights North Korean Hackers In Court

    According to Microsoft, the hackers targeted the email addresses of government officials, university staff and people working on nuclear projects in both the United States and South Korea.

    The cyber espionage group is said to have penetrated the accounts and networks of Microsoft customers. These are attacks in order to steal sensitive information. Emails pretend to be legitimate. The cyber group also used malware to compromise systems and steal data, the company said.

    Sensitive Information

    The cyber espionage group is said to have penetrated the accounts and networks of Microsoft customers via phishing attacks in order to steal sensitive information. Credible-looking emails pretend to be legitimate. The group also used malware to compromise systems and steal data.

    Emails received by the victim are therefore forwarded to the hackers in the background. If the pishing victim has little IT knowledge, he probably won’t even notice it. Furthermore, the hacker group installed malware on some computers to steal their data. Microsoft is making headlines again and again because it was able to prevent hacker attacks and even find those responsible directly. Most recently, US presidential candidates fell victim to a cyberattack that Microsoft discovered.

    Microsoft Hackers

    Most Of The Attacks Were Aimed At Injecting The Remote Access

    Once installed on the victim’s computer, this malware extracts information from the computer, remains there permanently and waits for further instructions. Microsoft is making increasing use of legal means to act against international hacker groups.  The teams of the Digital Crimes Unit and the Threat Intelligence Center had been on the hackers’ track for some time. In the past few months, they have been monitoring their activities and analyzing their infrastructure. They were used among other things, for sending phishing emails and hosting fake login pages. Victims were in turn lured to these sites to steal credentials for internal networks and to launch and expand attacks from there.

    Recent Articles

    Maze leaks data on its own platform

    The Maze ransomware has been up to almost a year and a half. This week, security experts warned about the actions of the cyber...

    Emotet to spread the malware behind email archives

    If you find an attached pack to an email these days, you should be particularly careful: the highly developed malware Emotet could be lurking...

    500,000 Activision accounts have been leaked

    Activision has taken a position on the alleged leak. According to the publisher, there has never been a data leak. In some cases it is...

    Judge issues injunction against WeChat

    The US government wanted to take action against the app WeChat. A judge stood sideways. The app should disappear from the platforms in the...

    Mail provider Tutanota becomes target of cyber attacks

    Over the weekend, ongoing DDoS attacks and an infrastructure problem resulted in downtime for hundreds of users. While some were able to mitigate most...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox